In many practical settings, participants are willing to deviate from the protocol only if they remain undetected. Aumann and Lindell introduced a concept of covert adversaries to f...
While cryptographic algorithms are usually strong against mathematical attacks, their practical implementation, both in software and in hardware, opens the door to side-channel at...
Obtaining high quality images in MR is desirable not only for accurate visual assessment but also for automatic processing to extract clinically relevant parameters. Filtering-bas...
Ganesh Adluru, Tolga Tasdizen, Ross Whitaker, Edwa...
Abstract—The distributed nature and large scale of MapReduce programs and systems poses two challenges in using existing profiling and debugging tools to understand MapReduce pr...
This paper describes a robotic system that uses dance as a form of social interaction to explore the properties and importance of rhythmic movement in general social interaction. ...
Marek P. Michalowski, Selma Sabanovic, Hideki Kozi...